{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:24:55Z","timestamp":1772555095227,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T00:00:00Z","timestamp":1653955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T00:00:00Z","timestamp":1653955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,31]]},"DOI":"10.23919\/cycon55549.2022.9811060","type":"proceedings-article","created":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:09:32Z","timestamp":1656965372000},"page":"285-307","source":"Crossref","is-referenced-by-count":8,"title":["Security and Privacy Issues of Satellite Communication in the Avlatlon Domain"],"prefix":"10.23919","author":[{"given":"Georg","family":"Baselt","sequence":"first","affiliation":[{"name":"ETH Zurich,Department of Computer Science,Zurich,Switzerland"}]},{"given":"Martin","family":"Strohmeier","sequence":"additional","affiliation":[{"name":"Cyber-Defence Campus armasuisse Science &#x002B; Technology,Thun,Switzerland"}]},{"given":"James","family":"Pavur","sequence":"additional","affiliation":[{"name":"University of Oxford,Department of Computer Science,Oxford,United Kingdom"}]},{"given":"Vincent","family":"Lenders","sequence":"additional","affiliation":[{"name":"Cyber-Defence Campus armasuisse Science &#x002B; Technology,Thun,Switzerland"}]},{"given":"Ivan","family":"Martinovic","sequence":"additional","affiliation":[{"name":"University of Oxford,Department of Computer Science,Oxford,United Kingdom"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2017.8102083"},{"key":"ref11","article-title":"Last Call for SATCOM Security","author":"santamarta","year":"2018","journal-title":"IOActive"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900037"},{"key":"ref13","article-title":"Whispers Among the Stars","volume":"5","author":"pavur","year":"0","journal-title":"DEF CON &#x201C;Whispers Among the Stars A Practical Look at Perpetrating (and Preventing) Satellite Eavesdropping Attacks &#x201D; In Conference briefing Conference briefing Black Hat USA"},{"key":"ref14","article-title":"In Flight Hacking System","author":"santamarta","year":"2016","journal-title":"IOActive"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2979496"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/sat.1218"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24074"},{"key":"ref18","article-title":"Telstar 12 VANTAGE","year":"2020"},{"key":"ref4","article-title":"Why Passengers Are Demanding Live Television","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00056"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2162209"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41826-7_9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2018.8405023"},{"key":"ref1","article-title":"The World of Air Transport in 2019","year":"2019"},{"key":"ref9","first-page":"135","article-title":"Surveying Aviation Professionals on the Security of the Air Traffic Control System","author":"strohmeier","year":"2018","journal-title":"International Workshop on Cyber Security for Intelligent Transportation Systems"}],"event":{"name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","location":"Tallinn, Estonia","start":{"date-parts":[[2022,5,31]]},"end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9810978\/9810902\/09811060.pdf?arnumber=9811060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T21:49:50Z","timestamp":1661809790000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9811060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,31]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/cycon55549.2022.9811060","relation":{},"subject":[],"published":{"date-parts":[[2022,5,31]]}}}